CN105307111A - Position privacy protection method based on incremental neighbour inquiry - Google Patents

Position privacy protection method based on incremental neighbour inquiry Download PDF

Info

Publication number
CN105307111A
CN105307111A CN201410317993.5A CN201410317993A CN105307111A CN 105307111 A CN105307111 A CN 105307111A CN 201410317993 A CN201410317993 A CN 201410317993A CN 105307111 A CN105307111 A CN 105307111A
Authority
CN
China
Prior art keywords
query
space
user
point
inquiry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410317993.5A
Other languages
Chinese (zh)
Inventor
李千目
王鹏飞
朱保平
侯君
倪震
刘晓迁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Science and Technology Changshu Research Institute Co Ltd
Original Assignee
Nanjing University of Science and Technology Changshu Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Science and Technology Changshu Research Institute Co Ltd filed Critical Nanjing University of Science and Technology Changshu Research Institute Co Ltd
Priority to CN201410317993.5A priority Critical patent/CN105307111A/en
Publication of CN105307111A publication Critical patent/CN105307111A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a position privacy protection method based on incremental neighbour inquiry. The position privacy protection method respectively comprises the following three steps: (1), structuring an anonymous area; (2), estimating an inquiry point; and (3), performing incremental neighbour inquiry. The position privacy protection method is used for protecting the position privacy by adopting an incremental neighbour inquiry algorithm in combination with a road network environment under a P2P system structure. The position privacy protection method disclosed by the invention has the advantages that: a user structures the anonymous area by referring to the density of a road network at first while seeking a proxy user; a real position is replaced by the anonymous area, such that the position privacy requirement is ensured; to reduce communication expenses of an inquiry user and a position server, the position server stores a divided basic unit space by using a quadtree structure; the inquiry user estimates the position of the inquiry point according to the distribution condition of interest points, such that a returned result set satisfies requirements of the inquiry user while the communication expenses are controllable; and a requirement space range and an inquiry end condition are redefined, such that an inquiry range can cover a k neighbour result range expected by the inquiry user when the incremental neighbour inquiry taking the inquiry point as the circle centre achieves the inquiry end condition.

Description

A kind of location privacy protection method based on increment NN Query
Technical field
The present invention relates to the method for secret protection of a kind of mobile terminal in location Based service, specifically a kind of by increment NN Query, assailant cannot be inferred user's accurate location is with the method for protective position privacy.
Background technology
In recent years, along with popularizing fast of intelligent mobile terminal, the development of wireless communication technology, location Based service (LocationBasedService, LBS) penetrates into the every aspect of people's life.LBS refers to that mobile terminal utilizes various location technology to obtain oneself current position, and proposes the service relevant with customer location.This service brings great convenience to the life of people, changes the life style of people subtlely.Along with the fast development of LBS, location privacy problem receives the concern of people day by day.Such as when from my nearest hospital where user enjoys K-NN search " ", in the process of the service such as shortest path query " the nearest path in XX dining room ", assailant, by intercepting and capturing the Query Information of user, can infer the personal information, positional information etc. that user.This causes grave danger to the privacy of individual subscriber, and thus location privacy protection problems demand solves.
System configuration for location privacy protection can be divided into client server architecture, central server structure, mobile P 2 P structure etc.Wherein, 1) adopt the method for client server architecture to have assumed name based on k anonymity, user sends k positional information to location server, comprises actual position and the individual false position of k-1 of user, makes location server cannot tell the actual position of user.User can also construct the anonymous zone comprising customer location, and the location server anonymous zone of submitting to according to user cannot the accurate location at consumer positioning place.Client server architecture is easy to realize, but mobile terminal must possess powerful computing capability and storage capacity, and only utilize the knowledge of self to carry out anonymity, the positional information of other user in surrounding enviroment cannot be utilized, so the attack of not only easy person under attack, and the waste of shareable resource can be caused.2) researcher proposes position k anonymity technology based on central server structure, namely when user proposes the demand of location-based service, not directly send the single LBS comprising self accurate location to ask location server, but have employed anonymous server, this anonymous server is collected the request of k neighboring user and is constructed anonymous zone and send to location server.Because anonymous server constantly need carry out anonymity process and Query Result refinement, its burden is excessive, and when anonymous server victim controls or attack time, can bring serious privacy leakage problem to whole system.3) mobile P 2 P structure does not need static infrastructure, when user proposes service request, select an equity point at random by multihop routing to act on behalf of, then this equity point sends to server the service request of user, server returns query results to this equity point, and this equity point finally returns to inquiring user Query Result.This architecture is applicable in the mobile network without static infrastructure, but it assumes that each equity point is trusty, and when there is assailant in equity point, the location privacy protection of user is just difficult to ensure.
Therefore existing technology and scheme oneself through being difficult to the requirement meeting user, the active position method for secret protection studied under suitable system configuration becomes a urgent problems day by day.
Summary of the invention
The reciprocity mobile subscriber for oneself providing P2P to serve is believable to the present invention is directed to both cannot ensureing of existing in background technology; cannot ensure again as we provide the location server of inquiry service to be believable, so the object of the present invention is to provide a kind of method for secret protection can provide comparatively safe secret protection in the system configuration of untrusted.
The technical scheme realizing the object of the invention is: a kind of based on increment NN Query location privacy protection method, the method comprises the following steps:
A kind of location privacy protection method based on increment NN Query of the present invention, it uses P2P system configuration, and inquiring user agency by agreement user completes inquiry request, and considers the impact of road network environment on Query Result.The method that the present invention proposes has the following advantages compared with the existing method SpaceTwist based on increment NN Query:
1) inquiring user replaces actual position to initiate inquiry request to proxy user with anonymous zone.Mobile P 2 P structure can not ensure that each equity point is believable, request will be sent to proxy user when initiating inquiry request by user, in order to the privacy threats preventing incredible proxy user from bringing, first user will construct anonymous zone before seeking proxy user, replace actual position to ensure location privacy demand with anonymous zone, and inquiring user consider road mileage factor when constructing anonymous zone.
2) by estimating that the point of interest of each anonymous zone determines query point position.Proxy user initiates the increment NN Query centered by query point to location server, in SpaceTwist scheme, query point is Stochastic choice, inquiry communication-cost and the uncontrollable problem of query results can be brought like this, consider the impact of road mileage on Query Result herein, by the query point of estimation road mileage determination increment NN Query.
3) increment NN Query can cover the k neighbour range of results that inquiring user is expected.After determining query point, proxy user proposes increment NN Query to location server, herein the increment NN Query in SpaceTwist scheme is improved, change the definition of demand space and the condition of poll-final, make query context can cover the k neighbour range of results of inquiring user expectation.
Accompanying drawing explanation
Fig. 1 is system construction drawing of the present invention.
Fig. 2 is two-dimensional space cross segmentation figure of the present invention.
Fig. 3 is increment NN Query critical condition figure of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the present invention is further described.
As shown in Figure 1, a kind of location privacy protection method based on increment NN Query of the present invention, its system configuration is made up of mobile subscriber, base station and location server.Each mobile terminal possesses basic positioning function, and can not only be communicated with location server by mobile base station, can also carry out P2P communicate with other users, and what wherein initiate inquiry request is that inquiring user (is designated as ), receive inquiring user request and what carry out increment NN Query with location server is that proxy user (is designated as ).Location server provides the services such as location-based NN Query, range query.
Particularly, the location privacy protection method based on increment NN Query of the present invention, it is mainly divided into three key steps:
Step one: anonymous zone constructs
P2P network can not ensure proxy user confidence level, so at inquiring user when sending LBS inquiry, to proxy user the inquiry request proposed can not comprise the accurate location of user.The anonymous zone building method that the present invention proposes with reference to road mileage, because road mileage and the density of population have positive correlation, the local density of population that road network is intensive is also corresponding larger.
1, inquiry request is defined , inquiring user with form to proxy user initiate inquiry request, wherein represent user identifier; = represent inquiring user the centre point latitude and longitude coordinates of anonymous zone; represent anonymous zone radius; represent inquiring user the query point of the increment NN Query estimated; represent inquiring user inquiry request content;
2, proxy requests is defined , proxy user with form send agents query request to location server, wherein represent the identifier of proxy user; represent from inquiry request the query point of the increment NN Query of middle acquisition; represent from inquiry request the inquiring user of middle acquisition inquiry request content;
3, road network granularity is defined if, for any one region, subspace in plane space region, for girth, for interior road total length, then define for road network granularity;
In order to easily implement and without loss of generality, we are considered as a square G the two-dimensional space that location server is responsible for, and then carry out cross recursive subdivision G, until the square space be divided into be not more than a set-point, as shown in Figure 2.Inquiring user first the segmentation result to G is obtained from location server before location server sends LBS request.
In order to reduce inquiring user with the communication overhead of location server, we use quad-tree structure to store these elementary cell spaces, the corresponding block comminute region of each node in quaternary tree, and the information such as link length in storage area center point coordinate, the region length of side, region in the data field of each node, regional center point coordinates, the region length of side are for determining corresponding cut zone, and in region, link length is for estimating query point.The corresponding elementary cell space of quad-tree structure leaf node, nonleaf node is to the region in requisition for continuation segmentation.Inquiring user obtain this quaternary tree of recursive search after segmentation result, find the unitary space at oneself place, and using the circumscribed circle region of this unitary space as inquiring user anonymous zone.
Step 2: query point is estimated
The increment NN Query that the present invention proposes requires that query results maintains a metastable scale, ensures that the result set returned meets inquiring user while making communication-cost controlled requirement.Query point evaluation method is: inquiring user to sending inquiry theme (as restaurant, hospital etc.) during location server request region segmentation result to location server, while location server return area segmentation quaternary tree, attach the density factor of this theme on data set (interest point that the road of unit length distributes); According to density factor the interest point distributed in each unitary space is calculated with the link length of unitary space; Hunting zone is expanded to surrounding, until the interest point of estimation meets the demand of inquiring user in hunting zone centered by the unitary space at place, anonymous zone; Construct the minimum circumscribed circle of this hunting zone, using any point on this circumscribed circle as query point, can solve like this query point apart from anonymous zone excessive or cross minor issue.
Step 3: increment NN Query
Definition supply space: with query point for the circular space in the center of circle, its radius for the Query Result that returns recently and query point distance.
Definition demand space: with inquiring user anonymous zone there is phase concentric circular space, its radius R is that location server returns Query Result to the center of circle, anonymous zone distance, wherein for in the Query Result that returned closest to the center of circle simultaneously and the center of circle distance be greater than query point again with the center of circle the Query Result point of distance, namely meet:
Ensure that demand space is not less than inquiring user like this the k neighbour range of results expected, wherein represent the current number of results returned of location server, represent arbitrary Query Result wherein, minimum value is got in min () expression, distance between representing at 2.
Increment NN Query process: proxy user receive inquiring user inquiry request after form proxy requests and send proxy requests to location server; Proxy user initialization supply space radius be 0, initial reguirements space radius R is , calculate query point to the demand space center of circle distance ; Location server is with query point centered by carry out NN Query and continuous result returned to proxy user ; Proxy user calculate the Query Result and query point that return distance, upgrade supply space radius ; Proxy user calculate the distance at Query Result and the center, anonymous zone returned if, be greater than and being less than current demand space radius R, then the space radius R that upgrades demand makes it equal ; Each renewal supply space radius after demand space radius R, check whether satisfied if meet, supply space comprises demand space, poll-final completely.
According to the critical condition that can obtain the description of increment NN Query process as shown in Figure 3.Now with meet .It should be noted that poll-final condition can not ensure just in time be positioned on broken circle as shown in Figure 3, be actually the outer Query Result closest to broken circle of broken circle, can ensure that query context covers like this reduce query context as best one can while the k neighbour range of results expected, reduce communication overhead.

Claims (5)

1., based on a location privacy protection method for increment NN Query, its system configuration is made up of mobile subscriber, base station and location server, it is characterized in that: the method comprises the following steps:
Step one: anonymous zone constructs
1) inquiry request is defined , inquiring user with form to proxy user initiate inquiry request, wherein represent user identifier; = represent inquiring user the centre point latitude and longitude coordinates of anonymous zone; represent anonymous zone radius; represent inquiring user the query point of the increment NN Query estimated; represent inquiring user inquiry request content;
2) proxy requests is defined , proxy user with form send agents query request to location server, wherein represent the identifier of proxy user; represent from inquiry request the query point of the increment NN Query of middle acquisition; represent from inquiry request the inquiring user of middle acquisition inquiry request content;
3) road network granularity is defined if, for any one region, subspace in plane space region, for girth, for interior road total length, then define for road network granularity;
Step 2: query point is estimated
Inquiring user to sending inquiry theme during location server request region segmentation result to location server, while location server return area segmentation quaternary tree, attach the density factor of this theme on data set ; According to density factor the interest point distributed in each unitary space is calculated with the link length of unitary space; Hunting zone is expanded to surrounding, until the interest point of estimation meets the demand of inquiring user in hunting zone centered by the unitary space at place, anonymous zone;
Step 3: increment NN Query
Definition supply space: with query point for the circular space in the center of circle, its radius for the Query Result that returns recently and query point distance;
Definition demand space: with inquiring user anonymous zone there is phase concentric circular space, its radius R is that location server returns Query Result to the center of circle, anonymous zone distance, wherein for in the Query Result that returned closest to the center of circle simultaneously and the center of circle distance be greater than query point again with the center of circle the Query Result point of distance, namely meet:
Ensure that demand space is not less than inquiring user like this the k neighbour range of results expected, wherein represent the current number of results returned of location server, represent arbitrary Query Result wherein, minimum value is got in min () expression, distance between representing at 2.
2. a kind of location privacy protection method based on increment NN Query according to claim 1; it is characterized in that: in step 2; the two-dimensional space that location server is responsible for is considered as a square G, then carries out cross recursive subdivision G, until the square space be divided into be not more than a set-point, inquiring user first the segmentation result to G is obtained from location server before location server sends LBS request.
3. a kind of location privacy protection method based on increment NN Query according to claim 1 and 2, it is characterized in that: in step 2, location server uses quad-tree structure to store the elementary cell space be divided into, the corresponding block comminute region of each node in quaternary tree, and storage area center point coordinate in the data field of each node, the region length of side, link length information in region, regional center point coordinates, the region length of side is for determining corresponding cut zone, in region, link length is for estimating query point, the corresponding elementary cell space of quad-tree structure leaf node, nonleaf node is to the region in requisition for continuation segmentation, inquiring user obtain this quaternary tree of recursive search after segmentation result, find the unitary space at oneself place, and using the circumscribed circle region of this unitary space as inquiring user anonymous zone.
4. a kind of location privacy protection method based on increment NN Query according to claim 1, is characterized in that: in step 3, inquiring user increment NN Query scope is estimated, using the minimum circumscribed circle center of circle of this scope as increment NN Query query point according to the distributed quantity of point of interest in each elementary cell space.
5. a kind of location privacy protection method based on increment NN Query according to claim 1, is characterized in that: in step 3, proxy user receive inquiring user inquiry request after form proxy requests and send proxy requests to location server; Proxy user initialization supply space radius be 0, initial reguirements space radius R is , calculate query point to the demand space center of circle distance ; Location server is with query point centered by carry out NN Query and continuous result returned to proxy user ; Proxy user calculate the Query Result and query point that return distance, upgrade supply space radius ; Proxy user calculate the distance at Query Result and the center, anonymous zone returned if, be greater than and being less than current demand space radius R, then the space radius R that upgrades demand makes it equal ; Each renewal supply space radius after demand space radius R, check whether satisfied if meet, supply space comprises demand space, poll-final completely.
CN201410317993.5A 2014-07-07 2014-07-07 Position privacy protection method based on incremental neighbour inquiry Pending CN105307111A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410317993.5A CN105307111A (en) 2014-07-07 2014-07-07 Position privacy protection method based on incremental neighbour inquiry

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410317993.5A CN105307111A (en) 2014-07-07 2014-07-07 Position privacy protection method based on incremental neighbour inquiry

Publications (1)

Publication Number Publication Date
CN105307111A true CN105307111A (en) 2016-02-03

Family

ID=55203768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410317993.5A Pending CN105307111A (en) 2014-07-07 2014-07-07 Position privacy protection method based on incremental neighbour inquiry

Country Status (1)

Country Link
CN (1) CN105307111A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105791283A (en) * 2016-02-29 2016-07-20 电子科技大学 Circle range search method specific to encrypted spatial data
CN106372670A (en) * 2016-09-06 2017-02-01 南京理工大学 Loyalty index prediction method based on improved nearest neighbor algorithm
CN107133527A (en) * 2017-04-20 2017-09-05 河南科技大学 A kind of personalized recommendation method based on location privacy protection
CN107172095A (en) * 2017-07-05 2017-09-15 重庆邮电大学 Customer location method for secret protection under a kind of road network environment based on longitude and latitude grid
CN107204984A (en) * 2017-06-22 2017-09-26 石家庄铁道大学 A kind of location privacy protection method and system
CN107204988A (en) * 2017-06-28 2017-09-26 华南理工大学 A kind of location privacy protection method under the structure based on P2P
CN107729494A (en) * 2017-10-18 2018-02-23 北京中遥地网信息技术有限公司 A kind of POI search methods based on the mapping of Z-type space curve
CN107835241A (en) * 2017-11-02 2018-03-23 辽宁工业大学 A kind of secret protection region construction method in road network environment under Continuous Nearest Neighbors Inquiry
CN108632401A (en) * 2018-03-14 2018-10-09 中国互联网络信息中心 Reduce the anonymous querying method and system of privacy compromise on DNS recursion servers
CN109858279A (en) * 2019-01-16 2019-06-07 安徽师范大学 Based on the k nearest Neighbor for trusting excitation and location privacy protection
CN110248315A (en) * 2019-04-24 2019-09-17 广东工业大学 A kind of location privacy protection method based on double anchor points
CN110611667A (en) * 2019-09-02 2019-12-24 深圳市赛梅斯凯科技有限公司 Dynamic position privacy protection method and device in edge computing environment
CN111061824A (en) * 2019-11-27 2020-04-24 北京中交兴路信息科技有限公司 Range judgment method, device and equipment based on improved quadtree
CN111597462A (en) * 2020-05-14 2020-08-28 河南科技大学 Position neighbor query method based on differential privacy

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595319A (en) * 2012-03-12 2012-07-18 浙江大学 Method for protecting user position privacy in mobile peer-to-peer network
CN103037306A (en) * 2012-12-06 2013-04-10 南京邮电大学 Privacy protection method based on location service in scene of Internet of Things (IOT)
CN103249038A (en) * 2013-04-09 2013-08-14 哈尔滨工程大学 Privacy protection method based on location of moving object in road network space
US20140090023A1 (en) * 2012-09-27 2014-03-27 Hong Kong Baptist University Method and Apparatus for Authenticating Location-based Services without Compromising Location Privacy

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595319A (en) * 2012-03-12 2012-07-18 浙江大学 Method for protecting user position privacy in mobile peer-to-peer network
US20140090023A1 (en) * 2012-09-27 2014-03-27 Hong Kong Baptist University Method and Apparatus for Authenticating Location-based Services without Compromising Location Privacy
CN103037306A (en) * 2012-12-06 2013-04-10 南京邮电大学 Privacy protection method based on location service in scene of Internet of Things (IOT)
CN103249038A (en) * 2013-04-09 2013-08-14 哈尔滨工程大学 Privacy protection method based on location of moving object in road network space

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
彭瑞卿: "移动网络中的位置隐私保护方法研究", 《武汉大学2013年博士学位论文》 *
毛典辉,蔡强,李海生,黄今慧: "协作代理增量查询的LBS隐私保护方法", 《华中科技大学学报(自然科学版)》 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105791283A (en) * 2016-02-29 2016-07-20 电子科技大学 Circle range search method specific to encrypted spatial data
CN105791283B (en) * 2016-02-29 2018-09-21 电子科技大学 A kind of circular scope searching method for encrypted spatial data
CN106372670A (en) * 2016-09-06 2017-02-01 南京理工大学 Loyalty index prediction method based on improved nearest neighbor algorithm
CN107133527B (en) * 2017-04-20 2019-10-29 河南科技大学 A kind of personalized recommendation method based on location privacy protection
CN107133527A (en) * 2017-04-20 2017-09-05 河南科技大学 A kind of personalized recommendation method based on location privacy protection
CN107204984A (en) * 2017-06-22 2017-09-26 石家庄铁道大学 A kind of location privacy protection method and system
CN107204984B (en) * 2017-06-22 2020-05-19 石家庄铁道大学 Position privacy protection method and system
CN107204988A (en) * 2017-06-28 2017-09-26 华南理工大学 A kind of location privacy protection method under the structure based on P2P
CN107204988B (en) * 2017-06-28 2020-05-22 华南理工大学 Position privacy protection method based on P2P structure
CN107172095A (en) * 2017-07-05 2017-09-15 重庆邮电大学 Customer location method for secret protection under a kind of road network environment based on longitude and latitude grid
CN107172095B (en) * 2017-07-05 2020-04-28 重庆邮电大学 Method for protecting user position privacy in road network environment based on graticule
CN107729494A (en) * 2017-10-18 2018-02-23 北京中遥地网信息技术有限公司 A kind of POI search methods based on the mapping of Z-type space curve
CN107835241A (en) * 2017-11-02 2018-03-23 辽宁工业大学 A kind of secret protection region construction method in road network environment under Continuous Nearest Neighbors Inquiry
CN107835241B (en) * 2017-11-02 2021-05-07 辽宁工业大学 Privacy protection area construction method under continuous neighbor query in road network environment
CN108632401A (en) * 2018-03-14 2018-10-09 中国互联网络信息中心 Reduce the anonymous querying method and system of privacy compromise on DNS recursion servers
CN109858279A (en) * 2019-01-16 2019-06-07 安徽师范大学 Based on the k nearest Neighbor for trusting excitation and location privacy protection
CN109858279B (en) * 2019-01-16 2022-07-08 安徽师范大学 K nearest neighbor query method based on trust incentive and position privacy protection
CN110248315A (en) * 2019-04-24 2019-09-17 广东工业大学 A kind of location privacy protection method based on double anchor points
CN110611667A (en) * 2019-09-02 2019-12-24 深圳市赛梅斯凯科技有限公司 Dynamic position privacy protection method and device in edge computing environment
CN110611667B (en) * 2019-09-02 2022-04-12 锦图计算技术(深圳)有限公司 Dynamic position privacy protection method and device in edge computing environment
CN111061824A (en) * 2019-11-27 2020-04-24 北京中交兴路信息科技有限公司 Range judgment method, device and equipment based on improved quadtree
CN111061824B (en) * 2019-11-27 2023-07-25 北京中交兴路信息科技有限公司 Range judging method, device and equipment based on improved quadtree
CN111597462A (en) * 2020-05-14 2020-08-28 河南科技大学 Position neighbor query method based on differential privacy
CN111597462B (en) * 2020-05-14 2022-03-29 河南科技大学 Position neighbor query method based on differential privacy

Similar Documents

Publication Publication Date Title
CN105307111A (en) Position privacy protection method based on incremental neighbour inquiry
US9736685B2 (en) Cloaking with footprints to provide location privacy protection in location-based services
CN107251624B (en) Location determination of mobile devices
Pingley et al. Cap: A context-aware privacy protection system for location-based services
Hashem et al. “Don’t trust anyone”: Privacy protection for location-based services
Wicker The loss of location privacy in the cellular age
Pingley et al. A context-aware scheme for privacy-preserving location-based services
CN104580350B (en) The system and method determined for position
Chow et al. Privacy in location-based services: a system architecture perspective
CN105246072A (en) User position privacy protection method under road network environment and system thereof
JP2014531587A (en) Positioning based on georeference of mobile devices
Victor et al. Geofences on the blockchain: Enabling decentralized location-based services
Che et al. A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks
Ullah et al. A novel model for preserving location privacy in Internet of Things
Ashraf et al. State-of-the-art Challenges: Privacy Provisioning in TPP Location Based Services Systems
Ashraf et al. IDP: A privacy provisioning framework for TIP attributes in trusted third party-based location-based services systems
Song et al. Efficient dummy generation for considering obstacles and protecting user location
Miura et al. A hybrid method of user privacy protection for location based services
Gao et al. Location privacy protection algorithm for mobile networks
Che et al. SALS: semantics-aware location sharing based on cloaking zone in mobile social networks
Konstantinidis et al. Towards planet-scale localization on smartphones with a partial radiomap
Kasori et al. Location privacy protection considering the location safety
Miura et al. Evaluation of a hybrid method of user location anonymization
Li et al. A decentralized location-query-sensitive cloaking algorithm for LBS
Salem et al. 3rd party geolocation messaging: a positioning enabler middleware for realizing context-aware polling

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160203